The rise of blockchain internet of things (biot): Secured, device-to-device architecture and simulation scenarios

A Rana, S Sharma, K Nisar, AAA Ibrahim, S Dhawan… - Applied Sciences, 2022 - mdpi.com
Most Internet of Things (IoT) resources are exposed to security risks due to their essential
functionality. IoT devices, such as smartphones and tablets, have a limited network …

Blockchain technology and artificial intelligence based decentralized access control model to enable secure interoperability for healthcare

SK Rana, SK Rana, K Nisar, AA Ag Ibrahim, AK Rana… - Sustainability, 2022 - mdpi.com
Healthcare, one of the most important industries, is data-oriented, but most of the research in
this industry focuses on incorporating the internet of things (IoT) or connecting medical …

Security of federated learning in 6G era: A review on conceptual techniques and software platforms used for research and analysis

SHA Kazmi, F Qamar, R Hassan, K Nisar… - Computer Networks, 2024 - Elsevier
Federated Learning (FL) is an emerging Artificial Intelligence (AI) paradigm enabling
multiple parties to train a model collaboratively without sharing their data. With the upcoming …

A reference architecture for iot-enabled smart buildings

MR Bashir, AQ Gill, G Beydoun - SN computer science, 2022 - Springer
The management and analytics of big data generated from IoT sensors deployed in smart
buildings pose a real challenge in today's world. Hence, there is a clear need for an IoT …

Robotic arm: impact on industrial and domestic applications

N Chahal, R Bisht, AK Rana… - … Sciences: A Multi and …, 2023 - Wiley Online Library
Industrial robotic arms help organizations gain a competitive advantage and reduce costs by
automating important activities that contribute to worker safety, faster production, and higher …

A survey on blockchain technology supported approaches for healthcare system, open issues and challenges

SK Rana, SK Rana, AK Rana, K Nisar… - … and Statistics (MACS …, 2022 - ieeexplore.ieee.org
In the last few years, technological development has multiplied. New technologies are
affecting almost every industry. One of these which noticed the abrupt change in their …

A comparative analysis of recurrent neural network and support vector machine for binary classification of spam short message service

D Odera, G Odiaga - World Journal of Advanced Engineering …, 2023 - mail.wjaets.com
Over the years, communication through Short Message Service (SMS) has been a primary
tool for mobile subscribers. SMS has varied applications in health, industry, finances …

Security in Federated Learning Enabled 6g Era: A Review on Conceptual Techniques and Software Platforms Used for Research and Analysis

SHA Kazmi, F Qamar, R Hassan, K Nisar… - Available at SSRN …, 2024 - papers.ssrn.com
Federated Learning (FL) is an emerging Artificial Intelligence (AI) paradigm that enables
multiple parties to collaboratively train a model without sharing their data. With the upcoming …

Intelligent fuzzy logic based intrusion detection system for effective detection of black hole attack in wsn

S Ravindran - Peer-to-Peer Networking and Applications, 2024 - Springer
A wireless sensor network (WSN) is a distributed collection of tiny, low-power, wireless
devices which are deployed in a physical environment to monitor the various environmental …

IoT networks: Security vulnerabilities of application layer protocols

M Lalit, SK Chawla, AK Rana, K Nisar… - … and Statistics (MACS …, 2022 - ieeexplore.ieee.org
Enabling objects to work intelligently through various communication technologies is a
common phenomenon. Objects become intelligent and are allowed to work autonomously …